default search action
22nd AINA Workshops 2008: Gino-wan City, Okinawa, Japan
- 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008. IEEE Computer Society 2008
- M. V. Panduranga Rao, K. Chandrashekar Shet, R. Balakrishna, K. Roopa:
Development of Scheduler for Real Time and Embedded System Domain. 1-6 - Cai Zhiming, Yin Jun, Huang Liangli:
The Solution Modelling System with Grouped Agents. 7-11 - Min Peng, Laurence Tianruo Yang, Wuqing Zhao, Naixue Xiong:
Wireless Service Attributes Classification and Matching Mechanism Based on Decision Tree. 12-17 - Xuan Gu, Dong Wang, Huanye Sheng:
RFID-Based Locating Management. 18-23 - Li Han, Jyri P. Salomaa, Jian Ma, Kuifei Yu:
Research on Context-Aware Mobile Computing. 24-30 - Hiroyasu Mitsui, Hidetoshi Kambe, Satoshi Endo, Hisao Koizumi:
A Student Experiment Method for Learning the Basics of Embedded Software Development Including HW/SW Co-design. 31-37 - Hiroaki Yuze, Chaoqun Wang, Shigeki Sugiura, Takeshi Otofuji, Toshiki Aikawa:
A Prototype System to Support the KJ Method by Cooperation between Visually-Impaired Persons and Sighted Persons. 38-43 - Andreas Konstantinidis, Thrasyvoulos Tsiatsos:
Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning Environment. 44-49 - Ming-Yang Su, Sheng-Cheng Yeh, Kai-Chi Chang, Hua-Fu Wei:
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems. 50-55 - Jianhua Yang, Byong Lee, Stephen S. H. Huang:
Monitoring Network Traffic to Detect Stepping-Stone Intrusion. 56-61 - Nen-Fu Huang, Hsien-Wei Hung, Sheng-Hung Lai, Yen-Ming Chu, Wen-Yen Tsai:
A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems. 62-67 - Jin-Cherng Lin, Chun-Lun Chou, Cheng-Hsiung Liu:
Performance Evaluation for Scheduling Algorithms in WiMAX Network. 68-74 - Sina Meraji, Hamid Sarbazi-Azad:
Empirical Performance Evaluation of Stretched Hypercubes. 75-79 - Priscila Solís Barreto, Paulo Henrique Portela de Carvalho:
Hybrid Traffic Model for Multimedia Network Performance Evaluation. 80-85 - Po-Cheng Chen, Cheng-I Lin, Sheng-Wei Huang, Jyh-Biau Chang, Ce-Kuen Shieh, Tyng-Yeu Liang:
A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid Systems. 86-91 - Cameron Kiddle, Derek Kivi, Rob Simmonds:
Model-Driven Automation in Grid Environments. 92-99 - Xudong Ni, Junzhou Luo:
A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations. 100-105 - YongNyuo Shin, YongJun Lee, Woochang Shin, Jinyoung Choi:
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems. 106-110 - Giovanni Russello, Changyu Dong, Naranker Dulay:
A Workflow-Based Access Control Framework for e-Health Applications. 111-120 - Sekpon Juntapremjitt, Somchart Fugkeaw, Piyawit Manpanpanich:
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain. 121-126 - Yinliang Yue, Fang Wang, Dan Feng:
DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage System. 127-132 - Yusuke Murase, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Distributed Databases in Dynamic R-Tree for Vehicle Information Systems. 133-138 - Lubna K. Alazzawi, Ali M. Elkateeb, Aiyappa Ramesh, Waleed Aljuhar:
Scalability Analysis for Wireless Sensor Networks Routing Protocols. 139-144 - Jaiwant Mulik:
Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate Applications. 145-150 - Xiangjiang Hu, Peidong Zhu, Kaiyu Cai, Zhenghu Gong:
AS Alliance in Inter-Domain Routing. 151-156 - Yong-Ju Lee, Hag-Young Kim, Cheol-Hoon Lee:
A Stochastic Availability Prediction Model for Head Nodes in the HA Cluster. 157-161 - Suzhen Wu, Dan Feng, Bo Mao, Jianxi Chen, Lingfang Zeng:
SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded Mode. 162-167 - Katsuyoshi Matsumoto, Shingo Nomoto, Minoru Uehara, Hideki Mori:
Fault Tolerant Small-World Cellular Neural Networks. 168-172 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:
Parallel Computing of CG Using an Open Source Windows Grid. 173-180 - Yih-Jiun Lee, Kai-Wen Lien:
Script: Simulations from Grid to Ubiquitous Computing. 181-186 - Ke Xu, Junwei Cao, Lianchen Liu, Cheng Wu:
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis. 187-194 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:
A Case Study of a Linux Grid on Windows Using Virtual Machines. 195-200 - Yongyi Zhao, Jin Li:
Research on Location Service Integration Strategy. 201-204 - Misbah Mubarak, Sara Sultana, Zarrar Abbas Khan, Hafiz Farooq Ahmad, Hajra Batool Asghar, Hiroki Suguri:
Strongly Instrumented Generic Mobility Architecture (SIGMA). 205-210 - Andre Elia Assad, Nelson Souto Rosa:
Device Middleware for Heterogeneous Access to Java Services. 211-216 - Eunyong Park, Sunyoung Han, Heemin Kim, Kiwon Son:
Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LAN. 217-222 - Razvan Beuran, Junya Nakata, Takashi Okada, Lan Tien Nguyen, Yasuo Tan, Yoichi Shinoda:
A Multi-Purpose Wireless Network Emulator: QOMET. 223-228 - Ngoc Bao Tran, Dinh Thuc Nguyen:
A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN. 229-234 - Shingo Kawamura, Shinya Toji, Minoru Uehara, Hideki Mori:
A Method of Project Member Arrangement of Using SOM for a Web Community. 235-240 - Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. 241-246 - Junze Wang, Yi Guo, Benxiong Huang, Jianhua Ma, Yijun Mo:
Delta Compression for Information Push Services. 247-252 - Boyoung Rhee, Kwangman Koh, Sunyoung Han:
Overlay Multicast Architecture Supporting QoS over NGN. 253-258 - Mohamed El Hachimi, Marc-Andre Breton, Maria Bennani:
Efficient QoS Implementation for MPLS VPN. 259-263 - Dan Feng, Chengtao Lu, Fang Wang:
eMuse: QoS Guarantees for Shared Storage Servers. 264-269 - Kuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang:
An Optimal Solution of Byzantine Agreement in a Scale Free Network. 270-275 - Rashid Bin Muhammad:
A Parallel Computation of the Steiner Tree Algorithm on Server-Client Paradigm. 276-280 - Kai Han, Binoy Ravindran, E. Douglas Jensen:
LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems. 281-287 - Zheng Da Wu:
Resource-Cost Analysis for Massively Multiplayer Online Games. 288-295 - Dan Gao, Jueping Cai, Zan Li, Xing Wei, Rei Chen:
Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum Sharing. 296-300 - Mohsen Taherian, Rasool Jalili, Morteza Amini:
PTO: A Trust Ontology for Pervasive Environments. 301-306 - Mingchu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang:
Granularity Considering in a Trust Model for P2P Networks. 307-312 - Yoshio Nakajima, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) Network. 313-318 - Alireza Goudarzi Nemati, Makoto Takizawa:
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks. 319-324 - Xuping Tu, Hai Jin, Xiaofei Liao, Weidong Wang, Sirui Yang, Qi Huang:
Collaboratively Scheduling to Decrease Inter-AS Traffic in P2P Live Streaming. 325-330 - Kai Hu, Yan Jiang, Zhibin Yang, Shiran Chen:
An Expanded Stochastic Model in DAG Schemes. 331-336 - Jing Du, Canqun Yang, Fujiang Ao, Xuejun Yang:
OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream Processor. 337-342 - Yuehua Shi, Feng Zhao, Zhong Zhang:
Hardware Implementation of ADABOOST ALGORITHM and Verification. 343-346 - Mehrdad Manaffar, Hamidreza Bakhshi, Mostafa Pilevari:
A New Dynamic Pricing Scheme with Call Admission Control to Reduce Network Congestion. 347-352 - Mohammad Mirza-Aghatabar, Somayyeh Koohi, Shaahin Hessabi, Dara Rahmati:
An Adaptive Approach to Manage the Number of Virtual Channels. 353-358 - Muhammad Bilal Ali, Muhammad Kamran, Hafiz Farooq Ahmad, Hiroki Suguri, Ali Liaqat:
Cell Level Co-Operation for SLA Based Radio Resource Management. 359-364 - Ying Huang, Xiangsheng Fu, Qiang Hou, Zifan Yu:
The Early Detection of DDoS Based on the Persistent Increment Feature of the Traffic Volume. 365-370 - Tae-Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:
Annulling SYN Flooding Attacks with Whitelist. 371-376 - Yacine Djemaiel, Noureddine Boudriga:
Dynamic Detection and Tolerance of Attacks in Storage Area Networks. 377-382 - Benting Wan:
Scheduling Strategy of Subtask Decomposed. 383-386 - Gonzalo Huerta Cánepa, Dongman Lee:
An Adaptable Application Offloading Scheme Based on Application Behavior. 387-392 - Pedro Nuno San-Bento Furtado:
Efficient Shared Computations over Distributed Sites. 393-398 - Yoshitaka Yokokawa, Koji Hashimoto, Yoshitaka Shibata:
PLEXCast: Peer-to-Peer Flexble Broadcast System. 399-406 - Keita Matsuo, Leonard Barolli, Fatos Xhafa, Akio Koyama, Arjan Durresi, Makoto Takizawa:
Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment. 407-412 - Ying Wang, Xinjun Du, Hui Li, Yumin Wang:
The Design of Optimal Period Interleaver. 413-415 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client. 416-421 - Jingwei Liu, Rong Sun, Wenping Ma, Ying Li, Xinmei Wang:
Fair Exchange Signature Schemes. 422-427 - Guoyan Zhang, Shaohui Wang:
Aggregate and Separate of Signatures in Wireless Network. 428-433 - Joel J. P. C. Rodrigues, Mário M. Freire:
Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times. 434-439 - Shu-Ming Tseng, Yu-Chin Kuo, Yueh-Teng Hsu:
Simpler and More Accurate Throughput Analysis of CDMA Pure ALOHA Networks with Variable Length Traffic. 440-444 - Cheng-Feng Tai, Lin-Huang Chang, Ting-Wei Hou:
Improvement of SCTP Performance during Handshake Process. 445-450 - Wu-Hong Tsai, Yuan-Sun Chu:
A Core Migration Method to Minimize Inter-Destination Delay Variation. 451-456 - R. Gunasundari, S. Shanmugavel, K. Bakyalakshmi:
Fault Tolerant HAWAII Protocol for IP services in Wireless Networks. 457-462 - Dai Bin, Furong Wang, Jianhua Ma, Liu Jian:
Enhanced Chord-Based Routing Protocol Using Neighbors' Neighbors Links. 463-466 - Ivan Tomek, Rick Giles, Hai Zhang, Li Di:
FVE - A Virtual Environment for Collaboration. 467-472 - Cin-Shung Yang, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou:
Personalized iDTV Program in Multimedia Home Platform. 473-476 - Akihiro Miyakawa, Tomoyuki Ishida, Yoshitaka Shibata:
Visual and Physical Feature Analysis for Kansei Retrieval Method in VR Japanese Crafting Presentation System. 477-482 - Atsushi Takeda, Kazuo Hashimoto, Gen Kitagata, Salahuddin Muhammad Salim Zabir, Tetsuo Kinoshita, Norio Shiratori:
A New Authentication Method with Distributed Hash Table for P2P Network. 483-488 - Jedsada Phengsuwan, Naiyana Sahavechaphan:
WindChimer: The Partially Centralized and Controlled P2P System for Better Discovery. 489-494 - Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:
Role-Based Access Control in Peer-to-Peer (P2P) Societies. 495-500 - Eiji Sugino, Katsuyoshi Onodera, Norihisa Segawa, Jun Sawamoto:
Construction of Distributed Terminal Management System in Consideration of Hierarchical Subnet in Intranet. 501-507 - Hoyoung Lee, Jing Liu, Sunyoung Han:
Practical Multicast Security Architecture Using Sleep State. 508-513 - Mohammad Mirza-Aghatabar, Arash Tavakkol, Hamid Sarbazi-Azad, Abbas Nayebi:
An Adaptive Software-Based Deadlock Recovery Technique. 514-519 - Yan Shi, Min Sheng:
Study of a Scheduling Algorithm Based on Simple Network Coding with High Throughput and Low Delay. 520-525 - Lechang Cheng, Norman C. Hutchinson, Mabo Robert Ito:
RealNet: A Topology Generator Based on Real Internet Topology. 526-532 - Masaaki Noro, Fumiaki Tameshige, Ken-ichi Baba, Shinji Shimojo:
Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband Networks. 533-540 - Fan Zhang, Furong Wang, Bin Dai, Yafang Li:
Performance Evaluation of IEEE 802.15.4 Beacon-Enabled Association Process. 541-546 - Vasaka Visoottiviseth, Niwat Bureenok:
Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003. 547-552 - Koji Hashimoto, Yoshitaka Shibata:
Design and Implementation of Adaptive Streaming Modules for Multipoint Video Communication. 553-560 - Tarek R. Sheltami:
Neighbor-Aware Clusterhead for SNET. 561-566 - Bunthit Watanapa, Saowaluk Watanapa:
A Fuzzy Approach for Personalized Product Clustering with Flexible Discriminating Power. 567-572 - Wei-Hua Jiang, Jun Du, Feng Liu:
Research on System Integrative Evaluation Method Based on Survivability. 573-577 - Xin Xiao, Yuanchun Shi, Zhijia Chen, Baopeng Zhang:
On Constructing High Performance Overlay for Layered Streaming in Heterogeneous Networks. 578-584 - Jiandong Li, Xiaoyan Sun, Pengyu Huang, Jiyong Pang:
Performance Analysis of Active Target Localization Using TDOA and FDOA Measurements in WSN. 585-589 - Chun-Hsin Wang, Yen-Chih Chiang:
Multi-Layer Traceback under the Hierarchical Tracers Deployment. 590-595 - Ming Dong Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, Shou-Hsuan Stephen Huang:
Detecting Masqueraders Using High Frequency Commands as Signatures. 596-601 - Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:
An Automatic Mechanism for Adjusting Validation Function. 602-607 - Yong Liu, Zhong Chen, Yu Chen:
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. 608-614 - Jongwoo Sung, Sungjin Ahn, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang, Seongeun Yoo, Pohkit Chong, Daeyoung Kim:
Wireless Sensor Networks for Cultural Property Protection. 615-620 - Emad A. El-Sebakhy:
New Computational Intelligence Paradigm for Estimating the Software Project Effort. 621-627 - Seongeun Yoo, Pohkit Chong, Taisoo Park, Youngsoo Kim, Daeyoung Kim, Changsub Shin, Kyungbok Sung, Hyunhak Kim:
DGS: Driving Guidance System Based on Wireless Sensor Network. 628-633 - Amirhosein Taherkordi, Reza Mohammadi, Frank Eliassen:
A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks. 634-638 - Yi Wang, Furong Wang, Chunming Rong, Sufang Wang:
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. 639-643 - Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks. 644-649 - Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. 650-655 - Himanshu Pagey:
Building User Confidence in RFID Technology for Mobile and Retail Environments. 656-661 - Taehong Kim, Young-Guk Ha, Jihoon Kang, Daeyoung Kim, Pohkit Chong, Joo-Chan Sohn:
Experiments on Building Ubiquitous Robotic Space for Mobile Robot Using Wireless Sensor Networks. 662-667 - Paul Werstein:
An Experimental Network Proxy for Power Managed End Nodes. 668-674 - Ali El Kateeb, Lubna Al Azzawi:
Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and Challenges. 675-680 - Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris:
Wireless Sensor Network for Localized Maritime Monitoring. 681-686 - Soohong Park, Minho Lee, Cheolju Hwang:
Location Information Look-Up for Intelligent Handover Decision. 687-691 - Benting Wan:
Business-Based SMS Mobile Search. 692-695 - Rogério Luís de Carvalho Costa, Pedro Furtado:
Scheduling in Grid Databases. 696-701 - Haiyang Hu, Hua Hu:
Energy Optimization for Data Flow in Mobile Ad Hoc Wireless Networks Using Cooperative Communication. 702-707